First published: Tue Mar 10 2020(Updated: )
A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Scalance S602 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S602 | ||
Siemens Scalance S612 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S612 | ||
Siemens Scalance S623 Firmware | >=3.0<4.1 | |
Siemens SCALANCE S623 | ||
Siemens Scalance S627-2m Firmware | >=3.0<4.1 | |
Siemens SCALANCE S627-2M |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6585 is medium (6.1).
All versions >= V3.0 and < V4.1 of SCALANCE S602 are affected by CVE-2019-6585.
All versions >= V3.0 and < V4.1 of SCALANCE S612 are affected by CVE-2019-6585.
All versions >= V3.0 and < V4.1 of SCALANCE S623 are affected by CVE-2019-6585.
All versions >= V3.0 and < V4.1 of SCALANCE S627-2M are affected by CVE-2019-6585.
There is currently no known fix for CVE-2019-6585. Please refer to the vendor's advisory for any available updates or patches.